Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Denial of 911 emergency service attacks prevention method

Inactive Publication Date: 2006-02-23
ISSINSKI ANTON
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011] It is the goal of the present invention to increase the security of the public telephone networks and to reduce their vulnerability to the DDOS attacks launched from computer systems equipped with the modem devices.
[0012] In accordance with one aspect of the present invention, a method is provided to reduce the load onto the telecommunication network, public safety answering point (PSAP) staff and action stations during the periods of DDOS attacks. For each initiated call, the probability that the originator of the call is a computer device rather then a human is determined. The call is then further handled using determined probability of the call originator. For example, during high volume situations caused by DDOS attacks, calls may be re-routed, prioritized or terminated based on the obtained probability to avoid overflow.

Problems solved by technology

During the epidemic period millions of computers may become infected within few days.
One of the known damages that computer viruses do is performing distributed denial of service (DDOS) attacks on popular corporate Internet web servers.
The mechanism of the attack is based on the large but still limited performance capacity of the server computer and local network equipment.
During the attack, thousands and could be millions of compromised computers start sending request to the target clogging networks and backlogging the server.
As the result, legitimate requests sent from regular users cannot reach the destination server causing the denial of service effect.
Much more dangerous but fortunately not spread yet form of DDOS attack is one that is targeting public telephone networks launched from personal computers equipped with modems.
Such attacks may easily disrupt public telephone communications for prolonged periods of time.
Of course not every computer with a modem installed is connected to the public telephone network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Denial of 911 emergency service attacks prevention method
  • Denial of 911 emergency service attacks prevention method
  • Denial of 911 emergency service attacks prevention method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016]FIG. 2 is a schematic diagram illustrating the preferred embodiment of the first method of the present invention. In FIG. 2, compromised computer systems equipped with modems 101 launching DDOS attack are initiating telephone calls 106 targeting PSAP 104. The call initiator detection module 108 installed at the PSAP 104 analyses the call request, determines that the call was placed by a computer device and terminates it 109 before forwarding it to the operator 107. The legitimate calls 105 initiated by humans 102 reach operator 107.

[0017] To determine whether the call was originated by a modem or a human, one can analyze the DTMF tones pattern issued during the call placement by the subscriber. For example, when a modem dials up a number using the DTMF tone dialing mode, it provides quite accurate and constant duration of the DTMF tone followed by the fixed silent period. In contrast, when a human dials a number, the duration of the tone or a silent phase will be random and v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for preventing Distributed Denial Of Service (DDOS) attacks on telecommunication systems handling special number calls such as 911 emergency systems launched from compromised personal computers equipped with modems connected to public telephone networks is disclosed. For each initiated call, a probability that the originator of the call is a computer device rather then a human is determined. The call is then further handled using determined probability of the call originator.

Description

BACKGROUND OF THE INVENTION [0001] Wide spreading and popularity of personal computers lead to a phenomenon known as computer viruses. Virus is a software program written by individuals with intention to enter a computer system without the users permission. Viruses spread by replicating themselves into other computers mainly using communication networks and vulnerabilities of modern operating systems. During the epidemic period millions of computers may become infected within few days. According to some software security sources [1], there are about 70,000 computer viruses known at the present time and about 2,000 new ones emerging every year. [0002] Once virus is executed it gains virtually unlimited control over the computer resources, including peripheral equipment connected to the system. At this point virus writers decide what to do next with the compromised computer system. They may leave a ‘backdoor’ open—a software tool for remote controlling the infected computer or replace...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M11/04H04L12/66
CPCH04L63/1458H04M11/04H04L2463/141
Inventor ISSINSKI, ANTON
Owner ISSINSKI ANTON
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products